Profile image of Leo Zhang

Dr Leo Zhang

STAFF PROFILE

Position

Honorary Fellow

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Off-Campus (Home)

Publications

Filter by

2024

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning

J Lu, S Hu, W Wan, M Li, L Zhang, L Xue, H Wang, H Jin

(2024), IEEE Transactions on Information Forensics and Security, Piscataway, NJ., C1-1

journal article

Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback

H Liu, Y Wang, Z Zhang, J Deng, C Chen, L Zhang

(2024), Vol. 61, pp. 1-17, Information Processing & Management, Amsterdam, The Netherlands, C1-1

journal article

FairCMS: Cloud Media Sharing With Fair Copyright Protection

Xiangli Xiao, Yushu Zhang, Leo Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang

(2024), pp. 1-18, IEEE Transactions on Computational Social Systems, Piscataway, N.J., C1-1

journal article
2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization

N Sun, J Zhang, S Gao, L Zhang, S Camtepe, Y Xiang

(2023), Vol. 20, pp. 1186-1199, IEEE Transactions on Dependable and Secure Computing, Piscataway, New Jersey, C1

journal article

An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems

Yong Wang, Mingxing Gao, Xun Ran, Jun Ma, Leo Zhang

(2023), Vol. 216, pp. 1-10, Expert Systems with Applications, Amsterdam, The Netherlands, C1

journal article

PriGenX: Privacy-preserving Query With Anonymous Access Control for Genomic Data

Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Zhang, Anjia Yang

(2023), pp. 1-14, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1-1

journal article

An image encryption scheme based on Elementary and Life-liked cellular automatons

Wenrui Lv, Chong Fu, Xiuli Chai, Leo Zhang, Junxin Chen

(2023), Vol. 98, pp. 1-19, Physica Scripta, Bristol, Eng., C1-1

journal article

A Survey of PPG's Application in Authentication

L Li, C Chen, L Pan, L Zhang, Z Wang, J Zhang, Y Xiang

(2023), Vol. 135, pp. 103488-103488, Computers and Security, Amsterdam, The Netherlands, C1

journal article

Multi-Receiver Conditional Anonymous Singcryption for IoMT Crowdsourcing

Y Wang, X Zhang, R Chen, H Dai, X Wang, L Zhang, M Li

(2023), pp. 1-12, IEEE Internet of Things, Piscataway, N.J., C1-1

journal article

Providing prediction reliability through deep neural networks for recommender systems

J Deng, H Li, J Guo, L Zhang, Y Wang

(2023), Vol. 185, pp. 1-10, Computers and Industrial Engineering, Amsterdam, The Netherlands, C1-1

journal article

AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification

Z Gong, L Shen, Y Zhang, L Zhang, J Wang, G Bai, Y Xiang

(2023), Vol. 19, pp. 1241-1250, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger

M Xue, Y Wu, S Ni, L Zhang, Y Zhang, W Liu

(2023), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1-1

journal article

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks

B Abbasi, Q Zhong, L Zhang, S Gao, A Robles-Kelly, R Doss

(2023), Vol. 1794, pp. 296-307, ICONIP 2022 : Proceedings of the 29th Neural Information Processing Conference, Virtual Event, E1

conference

SigA: RPPG-based Authentication for Virtual Reality Head-mounted Display

L Li, C Chen, L Pan, L Zhang, J Zhang, Y Xiang

(2023), pp. 686-699, ACM International Conference Proceeding Series, E1

conference

A Four-Pronged Defense Against Byzantine Attacks in Federated Learning

W Wan, S Hu, M Li, J Lu, L Zhang, L Zhang, H Jin

(2023), pp. 7394-7402, MM 2023 : Proceedings of the 31st ACM International Conference on Multimedia 2023, Ottawa, Canada, E1-1

conference

PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness

S Hu, W Liu, M Li, Y Zhang, X Liu, X Wang, L Zhang, J Hou

(2023), pp. 666-675, MM 2023 : Proceedings of the 31st ACM International Conference on Multimedia 2023, Ottawa, Canada, E1

conference
2022

A Differentially Private Matrix Factorization Based on Vector Perturbation for Recommender System

Xun Ran, Yong Wang, Leo Zhang, Jun Ma

(2022), pp. 1-10, Neurocomputing, Amsterdam, The Netherlands, C1

journal article

A differentially private nonnegative matrix factorization for recommender system

X Ran, Y Wang, L Zhang, J Ma

(2022), Vol. 592, pp. 21-35, Information Sciences, Amsterdam, The Netherlands, C1

journal article

Natural Backdoor Attacks on Deep Neural Networks via Raindrops

F Zhao, L Zhou, Q Zhong, R Lan, L Zhang

(2022), Vol. 2022, pp. 1-11, Security and Communication Networks, Cairo, Egypt, C1

journal article

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Islam, Leo Zhang, Md Islam, Warren Armstrong

(2022), Vol. 10, pp. 44756-44777, IEEE Access, C1

journal article

Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption

Zhuo Liu, Jin Liu, Leo Zhang, Yong Zhao, Xiao Gong

(2022), Vol. 2022, pp. 1-18, Complexity, Chichester, Eng., C1

journal article

Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation

Z Zhang, H Zhu, P Ban, Y Wang, L Zhang

(2022), pp. 1-10, IEEE Transactions on Industrial Electronics, Piscataway, N.J., C1

journal article

Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing

Z Zheng, Z Li, H Jiang, L Zhang, D Tu

(2022), Vol. 17, pp. 2256-2271, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Equiprobable symbolization pattern entropy for time series complexity measurement

Fuyi Wang, Leo Zhang

(2022), Nonlinear Dynamics, Berlin, Germany, C1

journal article

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data

Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Zhang, Rongxing Lu

(2022), pp. 1-14, IEEE Transactions on Cloud Computing, Piscataway, N.J., C1

journal article

Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network

H Zhang, J Chen, L Zhang, C Fu, R Gravina, G Fortino, Z Lv

(2022), Vol. 26, pp. 5783-5792, IEEE Journal of Biomedical and Health Informatics, Piscataway, N.J., C1

journal article

Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting

Qi Zhong, Leo Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang

(2022), pp. 1-6, ICME 2022 : Proceedings of IEEE Multimedia & Expo 2022 Conference, Taipei, Taiwan, E1

conference

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-Robust Makeup Transfer

Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Zhang, Hai Jin, Libing Wu

(2022), pp. 15014-15023, CVPR 2022 : Computer Vision and Pattern Recognition : Proceedings of the Institute of Electrical and Electronics Engineers/Computer Vision Foundation 2022 conference, New Orleans, La., E1

conference

Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection

Wei Wan, Shengshan Hu, jianrong Lu, Leo Zhang, Hai Jin, Yuanyuan He

(2022), pp. 753-760, IJCAI 2022 : Proceedings f the Artificial Intelligence 2022 Joint Conference, Vienne, Austria, E1

conference

Working Mechanism of Eternalblue and Its Application in Ransomworm

Z Liu, C Chen, L Zhang, S Gao

(2022), Vol. 13547 LNCS, pp. 178-191, Proceedings - 14th International Symposium, CSS 2022, Xi’an, China, E1

conference

Towards Privacy-Preserving Neural Architecture Search

F Wang, L Zhang, L Pan, S Hu, R Doss

(2022), pp. 1-6, Proceedings - 2022 IEEE Symposium on Computers and Communications, Rhodes, Greece, E1

conference

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks

G Yang, M Ge, S Gao, X Lu, L Zhang, R Doss

(2022), Vol. 13787, pp. 406-425, NSS 2022 : Proceedings of the Network and System Security 2022 international conference, Denarau Island, Fiji, E1

conference
2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds

Y Zhang, J Zhou, Y Xiang, L Zhang, F Chen, S Pang, X Liao

(2021), Vol. 7, pp. 717-728, IEEE Transactions on Big Data, C1

journal article

Towards private and scalable cross-media retrieval

S Hu, L Zhang, Q Wang, Z Qin, C Wang

(2021), Vol. 18, pp. 1354-1368, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

A new item similarity based on α-divergence for collaborative filtering in sparse data

Y Wang, P Wang, Z Liu, L Zhang

(2021), Vol. 166, Expert Systems with Applications, C1

journal article

Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms

J Chen, L Zhang, Y Zhou

(2021), Vol. 31, pp. 4747-4758, IEEE Transactions on Circuits and Systems for Video Technology, C1

journal article

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

Z Liu, Y Wang, L Zhang, J Ma

(2021), Vol. 2021, Security and Communication Networks, C1

journal article

Deep neural-based vulnerability discovery demystified: data, model and performance

G Lin, W Xiao, L Zhang, S Gao, Y Tai, J Zhang

(2021), Vol. 33, pp. 13287-13300, Neural Computing and Applications, C1

journal article

An effective and efficient fuzzy approach for managing natural noise in recommender systems

P Wang, Y Wang, L Yu Zhang, H Zhu

(2021), Vol. 570, pp. 623-637, Information Sciences, C1

journal article

From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice

Y Wang, Z Liu, L Zhang, F Pareschi, G Setti, G Chen

(2021), Vol. PP, IEEE Transactions on Cybernetics, United States, C1

journal article

My Security: an interactive search engine for cybersecurity

Nan Sun, Shang Gao, Yu Zhang, Seyit Camtepe, Jun Zhang, Yang Xiang

(2021), pp. 6206-62015, Proceedings of the 54th Hawaii International Conference on System Sciences, Manoa, Hawaii, E1

conference

Shielding Federated Learning: A New Attack Approach and Its Defense

Wei Wan, Jianrong Lu, Shengshan Hu, Leo Zhang, Xiaobing Pei

(2021), pp. 1-7, WCNC 2021 : Proceedings of the IEEE Wireless Communications and Networking Conference, Nanjing, China, E1

conference

AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch

Shengshan Hu, Zhang Yechao, Xiaogeng Liu, Yu Zhang, Minghui Li, Hai Jin

(2021), pp. 1-9, MM '21: Proceedings of the 29th ACM International Conference on Multimedia, Virtual Event China, E1

conference
2020

You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center

L Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren

(2020), Vol. 17, pp. 1218-1231, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle

Y Zhang, X Huang, X Chen, L Zhang, J Zhang, Y Xiang

(2020), Vol. 7, pp. 1061-1071, IEEE Internet of Things Journal, C1

journal article

Informed histogram-based watermarking

Guang Hua, Yong Xiang, Leo Zhang

(2020), Vol. 27, pp. 236-240, IEEE signal processing letters, Piscataway, N.J., C1

journal article

A genetic algorithm for constructing bijective substitution boxes with high nonlinearity

Y Wang, Z Zhang, L Zhang, J Feng, J Gao, P Lei

(2020), Vol. 523, pp. 152-166, Information sciences, Amsterdam, The Netherlands, C1

journal article

VoterChoice: A ransomware detection honeypot with multiple voting framework

C Keong Ng, S Rajasegarar, L Pan, F Jiang, L Zhang

(2020), Vol. 32, Concurrency and Computation: Practice and Experience, C1

journal article

A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata

Z Liu, Y Wang, Y Zhao, L Zhang

(2020), Vol. 101, pp. 1383-1396, Nonlinear Dynamics, C1

journal article

Design and Analysis on a Parallel Chaos-Based Hash Function

Z Liu, Y Wang, G Jiang, L Zhang

(2020), Vol. 30, International Journal of Bifurcation and Chaos, C1

journal article

A novel chaotic map constructed by geometric operations and its application

Z Zhang, Y Wang, L Zhang, H Zhu

(2020), Vol. 102, pp. 2843-2858, Nonlinear dynamics, Cham, Switzerland, C1

journal article

A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data

Y Wang, X Zhao, Z Zhang, L Zhang

(2020), Journal of Information Science, C1

journal article

Protecting IP of deep neural networks with watermarking: a new label helps

Q Zhong, L Zhang, J Zhang, L Gao, Y Xiang

(2020), Vol. 12085, pp. 462-474, PAKDD 2020 : Proceedings of the 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, E1

conference

A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering

Y Wang, P Wang, X Zhao, Z Liu, Yu Zhang

(2020), pp. 212-215, BigDataService 2020 : Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, Oxford, England, E1

conference

A New Rabin-Type Cryptosystem with Modulus p2q

Digby Mooney, Lynn Batten, Leo Zhang

(2020), pp. 61-77, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Online from Brisbane, Qld., E1

conference

Data analytics of crowdsourced resources for cybersecurity intelligence

N Sun, J Zhang, S Gao, L Zhang, S Camtepe, Y Xiang

(2020), Vol. 12570, pp. 3-21, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Melbourne, Australia, E1

conference

Protecting the intellectual property of deep neural networks with watermarking: The frequency domain approach

M Li, Q Zhong, L Zhang, Y Du, J Zhang, Yong Xiang

(2020), pp. 402-409, TrustCom 2020 : Proceedings of IEEE's 19th International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China (part-virtually), E1

conference
2019

Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security

J Wang, J Li, H Wang, L Zhang, L Cheng, Q Lin

(2019), Vol. 6, pp. 5892-5901, IEEE Internet of Things Journal, C1

journal article

Secure wireless communications based on compressive sensing: a survey

Y Zhang, Y Xiang, L Zhang, Y Rong, S Guo

(2019), Vol. 21, pp. 1093-1111, IEEE communications surveys and tutorials, Piscataway, N.J., C1

journal article

Data-driven cybersecurity incident prediction: a survey

N Sun, J Zhang, P Rimba, S Gao, L Zhang, Y Xiang

(2019), Vol. 21, pp. 1744-1772, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal article

Medical image cipher using hierarchical diffusion and non-sequential encryption

J Chen, L Chen, L Zhang, Z Zhu

(2019), Vol. 96, pp. 301-322, Nonlinear dynamics, Dordrecht, The Netherlands, C1

journal article

Fast detection of maximal exact matches via fixed sampling of query K-mers and Bloom filtering of index K-mers

Yuansheng Liu, Yu Zhang, Jinyan Li

(2019), Vol. 35, pp. 4560-4567, Bioinformatics, Oxford, Eng., C1

journal article

Static malware clustering using enhanced deep embedding method

C Ng, F Jiang, L Zhang, W Zhou

(2019), Vol. 31, Concurrency and Computation: Practice and Experience, C1

journal article

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud

Yushu Zhang, Yong Xiang, Leo Zhang, Lu-Xing Yang, Jiantao Zhou

(2019), Vol. 496, pp. 150-160, Information sciences, Amsterdam, The Netherlands, C1

journal article

Compressed Sensing Based Selective Encryption with Data Hiding Capability

J Wang, L Zhang, J Chen, G Hua, Y Zhang, Y Xiang

(2019), Vol. 15, pp. 6560-6571, IEEE Transactions on Industrial Informatics, C1

journal article

Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis

J Chen, J Xing, L Zhang, L Qi

(2019), Vol. 15, International Journal of Distributed Sensor Networks, C1

journal article
2018

Improved known-plaintext attack to permutation-only multimedia ciphers

L Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen

(2018), Vol. 430-431, pp. 228-239, Information Sciences, C1

journal article

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things

Y Zhang, Q He, Y Xiang, L Zhang, B Liu, J Chen, Y Xie

(2018), Vol. 5, pp. 3442-3451, IEEE Internet of Things Journal, C1

journal article

On the security of a class of diffusion mechanisms for image encryption

L Zhang, Y Liu, F Pareschi, Y Zhang, K Wong, R Rovatti, G Setti

(2018), Vol. 48, pp. 1163-1175, IEEE Transactions on Cybernetics, United States, C1-1

journal article

Optical information authentication using optical encryption and sparsity constraint

J Chen, N Bao, L Zhang, Z Zhu

(2018), Vol. 107, pp. 352-363, Optics and lasers in engineering, Amsterdam, The Netherlands, C1

journal article

Defining embedding distortion for intra prediction mode-based video steganography

Q Nie, X Xu, B Feng, L Zhang

(2018), Vol. 55, pp. 59-70, Computers, Materials and Continua, C1

journal article
2017

On the Security of Optical Ciphers under the Architecture of Compressed Sensing Combining with Double Random Phase Encoding

J Chen, Y Zhang, L Zhang

(2017), Vol. 9, IEEE Photonics Journal, C1

journal article

Harnessing the Hybrid Cloud for Secure Big Image Data Service

Y Zhang, H Huang, Y Xiang, L Zhang, X He

(2017), Vol. 4, pp. 1380-1388, IEEE Internet of Things Journal, C1

journal article

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers

L Zhang, Y Zhang, Y Liu, A Yang, G Chen

(2017), Vol. 27, International Journal of Bifurcation and Chaos, C1

journal article

Cryptanalysis of optical ciphers integrating double random phase encoding with permutation

J Chen, N Bao, J Li, Z Zhu, L Zhang

(2017), Vol. 5, pp. 16124-16129, IEEE Access, C1-1

journal article

A local search enhanced differential evolutionary algorithm for sparse recovery

Q Lin, B Hu, Y Tang, L Zhang, J Chen, X Wang, Z Ming

(2017), Vol. 57, pp. 144-163, Applied soft computing, Amsterdam, The Netherlands, C1-1

journal article

A self-cited pixel summation based image encryption algorithm

G Ye, X Huang, L Zhang, Z Wang

(2017), Vol. 26, Chinese Physics B, C1-1

journal article
2016

Bi-level protected compressive sampling

L Zhang, K Wong, Y Zhang, J Zhou

(2016), Vol. 18, pp. 1720-1732, IEEE transactions on multimedia, Piscataway, N.J., C1-1

journal article

A review of compressive sensing in information security field

Y Zhang, L Zhang, J Zhou, L Liu, F Chen, X He

(2016), Vol. 4, pp. 2507-2519, IEEE access, Piscataway, N.J., C1-1

journal article

Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher

L Zeng, R Liu, L Zhang, Y Liu, K Wong

(2016), Vol. 75, pp. 5439-5453, Multimedia Tools and Applications, C1-1

journal article

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure

Y Liu, L Zhang, J Wang, Y Zhang, K Wong

(2016), Vol. 84, pp. 2241-2250, Nonlinear dynamics, Dordrecht, The Netherlands, C1-1

journal article

Embedding cryptographic features in compressive sensing

Y Zhang, J Zhou, F Chen, L Zhang, K-W Wong, X He, D Xiao

(2016), Vol. 205, pp. 472-480, Neurocomputing, Amsterdam, The Netherlands, C1-1

journal article

A block compressive sensing based scalable encryption framework for protecting significant image regions

Y Zhang, J Zhou, F Chen, L Zhang, D Xiao, B Chen, X Liao

(2016), Vol. 26, International Journal of Bifurcation and Chaos, C1-1

journal article

Support-set-assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds

Y Zhang, J Zhou, L Zhang, F Chen, X Lei

(2016), pp. 1-6, SocialSec 2015 : Proceedings of the 2015 International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1-1

conference
2015

Robust coding of encrypted images via structural matrix

Y Zhang, K-W Wong, L Zhang, W Wen, J Zhou, X He

(2015), Vol. 39, pp. 202-211, Signal processing: image communication, Amsterdam, The Netherlands, C1-1

journal article

Joint quantization and diffusion for compressed sensing measurements of natural images

L Zhang, K-W Wong, Y Zhang, Q Lin

(2015), pp. 2744-2747, ISCAS 2015 : Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, Lisbon, Portugal, E1-1

conference
2014

A chaotic image encryption scheme owning temp-value feedback

L Zhang, X Hu, Y Liu, K-W Wong, J Gan

(2014), Vol. 19, pp. 3653-3659, Communications in nonlinear science and numerical simulation, Amsterdam, The Netherlands, C1-1

journal article

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem

C Li, Y Liu, L Zhang, K-W Wong

(2014), Vol. 29, pp. 914-920, Signal processing: image communication, Amsterdam, The Netherlands, C1-1

journal article
2013

Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation

C Li, Y Liu, L Zhang, M Chen

(2013), Vol. 23, pp. 1-12, International journal of bifurcation and chaos, Singapore, C1-1

journal article
2012

Breaking a novel colour image encryption algorithm based on chaos

C Li, L Zhang, R Ou, K-W Wong, S Shu

(2012), Vol. 70, pp. 2383-2388, Nonlinear dynamics, Dordrecht, The Netherlands, C1-1

journal article

Breaking a chaotic image encryption algorithm based on perceptron model

Y Zhang, C Li, Q Li, D Zhang, S Shu

(2012), Vol. 69, pp. 1091-1096, Nonlinear dynamics, Dordrecht, The Netherlands, C1-1

journal article

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure

L Zhang, C Li, K-W Wong, S Shu, G Chen

(2012), Vol. 85, pp. 2077-2085, Journal of systems and software, Amsterdam, The Netherlands, C1-1

journal article

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, A/Prof Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

Department of Industry, Innovation and Science

  • 2022: $74,235
  • 2021: $123,725
  • 2019: $296,940

Other Funding Sources

Development of Australian Cyber Criteria Assessment.

Prof Chang-Tsun Li, Dr Leo Zhang, Dr Nan Sun

Cyber Security Research Centre Limited

  • 2022: $38,391
  • 2021: $141,250

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $60,488
  • 2023: $120,976

Supervisions

Principal Supervisor
2023

Qi Zhong

Thesis entitled: Ownership Authentication of Deep Neural Network Models with Watermarking

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2023

Lu Zhou

Thesis entitled: New Methods for Distributed Denial-of-Service Attack Detection

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Nan Sun

Thesis entitled: Data-driven cybersecurity incident prediction and discovery

Doctor of Philosophy (Information Technology), School of Information Technology

Junyang Qiu

Thesis entitled: Data-Driven Android Malware Intelligence with Machine Learning through Static Analysis

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology